a) Name some different groups of viruses. Ans: Resident viruses, Direct action Viruses, Overwrite Viruses and boot viruses
b) Name some well known antivirus programs. Ans: ESET NOD 32
c) What spyware is and what can it do? Ans: Spyware is computer software that is installed surreptitiously on a personal computer to intercept or take partial control over the user's interaction with the computer, without the user's informed consent.
d) What is a key-stoke logger and why is a problem for computer users?
Ans: A key-stroke logger is a method of capturing and recording user keystrokes.If the crimnals get the key logger installed to your computer then they will know everything that you are typing and this is the problem for the computer users.
e) How can you check whether a warning about a virus is real or a hoax?
Ans:
f) Use simple wikipedia to find out what a botnet is. Copy and paste the text together with a link to the source. Write your own explanation.
g) Find out what Trojans and Worms are. Add explanations from at least two websites. Then explain in your own words.
h) Name some ways of preventing your computer from being affected by viruses.
i) Find two stories about internet crime. Teach-ICT- Fraud News Add links to your page and add summaries
Look at the following websites and answer the following questions in your own words. you may need to look at other websites or ask your teacher.
Teach-ICT Hacking
Teach-ICT Viruses
Teach-ICT Computer Fraud
How Stuff Works Viruses
a) Name some different groups of viruses.
Ans: Resident viruses, Direct action Viruses, Overwrite Viruses and boot viruses
b) Name some well known antivirus programs.
Ans: ESET NOD 32
c) What spyware is and what can it do?
Ans: Spyware is computer software that is installed surreptitiously on a personal computer to intercept or take partial control over the user's interaction with the computer, without the user's informed consent.
d) What is a key-stoke logger and why is a problem for computer users?
Ans: A key-stroke logger is a method of capturing and recording user keystrokes. If the crimnals get the key logger installed to your computer then they will know everything that you are typing and this is the problem for the computer users.
e) How can you check whether a warning about a virus is real or a hoax?
Ans:
f) Use simple wikipedia to find out what a botnet is. Copy and paste the text together with a link to the source. Write your own explanation.
g) Find out what Trojans and Worms are. Add explanations from at least two websites. Then explain in your own words.
h) Name some ways of preventing your computer from being affected by viruses.
i) Find two stories about internet crime. Teach-ICT- Fraud News Add links to your page and add summaries